Mastodon

Stormshield CTI team came across two servers during our active threat hunting. They share a lot of similarities with servers reported by Check Point on APT35. The servers are active and resolve multiple domains used for phishing purpose. This blogpost shows how we found them, and how other security teams can do the same.

 

The code behind the song

APT35, also known as Mint Sandstorm / Charming Kitten / Educated Manticore, is an APT group affiliated with the Islamic Revolutionary Guard Corps (IRGC), a branch of the Iranian Armed Forces. This group is active since at least 2015 and carries out espionage and surveillance activities. It targets government, military, media, academic and international organizations located in the US, Middle East and Europe.

We were interested in the HTML page mentioned in the Check Point report. It was displayed on some domains and looks like four coloured dots:

Screenshot from viliam.ude-final[.]online, source: URLScan.io

Figure 1: Screenshot from viliam.ude-final[.]online, source: URLScan.io

The source code of the page is straightforward, as showed below:

<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width,initial-scale=1">
<link rel="stylesheet" href="/styles/font.css">
<script defer="defer" src="/static/js/main.7e80d47f.js"></script>
<link href="/static/css/main.365793d0.css" rel="stylesheet">
</head>

<body><noscript>You need to enable JavaScript to run this app.</noscript>
<div id="rb">
<div class="wrapper-loading">
<div class="blue ball"></div>
<div class="red ball"></div>
<div class="yellow ball"></div>
<div class="green ball"></div>
</div>
</div>
</body>

We observed that this page is hosted on multiple domains associated with the campaign reported by Check Point, with only the paths to the JavaScript script and CSS style sheet changing. We wanted to see if we could create a query to hunt confidently for other pages in the wild. Using the SilentPush platform, we were able to craft a request that matches this behaviour, using the html_body_ssdeep attribute:

Query results in SilentPush UI

Figure 2: Query results in SilentPush UI

 

We found eight matches related to IPv4 addresses mentioned in Check Point report: 45.143.166[.]230 and 195.66.213[.]132. We also found matches for two undocumented IPv4s: one for 84.200.193[.]20 (rohand63[.]xyz) and four for 79.132.131.184 (arcanet[.]online, look-together-online[.]online).

 

Typo squatting melody

The server 84.200.193[.]20 (AS 214036 Ultahost, Inc.) resolved domains mostly in July 2025, for a period of two to 12 days. There is only one domain still resolving this IPV4: rohan63[.]xyz.

Hosting timeline for IPv4 84.200.193[.]20, source: Validin

Figure 3: Hosting timeline for IPv4 84.200.193[.]20, source: Validin

The server, 79.132.131[.]184 (AS 39378, SERVINGA), resolves 49 domains, all with the “online” TLD. This IPv4 is active since at least July 20th 2025 and is still used at the time of writing. The most recent resolving domain, proof-video[.]online, was registered on September 20th 2025. All domains seem to be used for phishing purpose, most of them masquerading as video conferencing related domains, with naming such as meet.go0gle[.]online or meet.video-connect[.]online.

 

Hosting timeline for IPv4 79.132.131[.]184, source: Validin

Figure 4: Hosting timeline for IPv4 79.132.131[.]184, source: Validin

Using Google Meet, and more broadly the video conference theme, for phishing purpose is part of APT35’s TTPs since at least 2023 (see Google report).

 

Highways to hell

While investigating, we also found behaviours that could be used for tracking.

The first one is the URL query. We observed that searching on VirusTotal for URL with the online TLD and the query “?invitation” yields results. Here are all URLs we found with the following VT query entity:url url:online/?invitation.

URL
Submission Date
Submitted From
hxxps://viliam.superlite[.]online/?invitation-ter-nsbs-oer
2025-07-15
Sweden
hxxp://viliam.sky-writer[.]online/?invitation-caq-beqd-ery
2025-08-03
Israel
hxxps://viliam.alpha-met[.]online/?invitation-ter-nsbs-oeht
2025-08-10
Israel
hxxp://viliam.alpha-met[.]online/?invitation-tgr-nzfes-ohr
2025-08-10
Israel
hxxps://meet.ell-safe[.]online/invitation-fgh-rewk-evg
2025-09-17
Israel

We also found a very simple way to track new domains: just searching for subdomains starting with “viliam.” works well: entity:domain domain:viliam.*

Screenshot of the query on VirusTotal with matching indicators highlighted

Figure 5: Screenshot of the query on VirusTotal with matching indicators highlighted

The query found 112 domains at the time of writing. Not all of them are related to APT35 infrastructure, but it seems to be a good way to start looking for it.

 

Ending the show

The campaign reported by Check Point is still ongoing. APT35 did not change the way they set up their phishing domains since their last reported activity. It makes the task easier for defender to track their activities. The submitted URLs suggest that this campaign is still targeting Israel.

Every indicator shared on this blogpost is already blocked on Stormshield products.

 

Appendix

Queries

Platform
Query
Confidence
SilentPush
datasource = ["webscan"] AND html_body_ssdeep = "*Ve1LTG7faKjubGga" AND html_body_ssdeep = "6:q9hqIY0gYkC/fAbplGMuzT6palUvN*"
High
VirusTotal
entity:domain domain:viliam.*
Medium
VirusTotal
entity:url url:online/?invitation
High/Medium

Indicator of compromises

Value
Type
Comment
Confidence
79.132.131[.]184
IPV4
IPv4 hosting phishing domains
High
84.200.193[.]20
IPV4
IPv4 hosting phishing domains
High
viliam-live-identity[.]online
Domain
Phishing domain
High
viliam.viliam-live-identity[.]online
Domain
Phishing domain
High
proof-video[.]online
Domain
Phishing domain
High
look-together-online[.]online
Domain
Phishing domain
High
meet.proof-video[.]online
Domain
Phishing domain
High
www.look-together-online[.]online
Domain
Phishing domain
High
viliam.look-together-online[.]online
Domain
Phishing domain
High
www.video-connect[.]online
Domain
Phishing domain
High
meet.video-connect[.]online
Domain
Phishing domain
High
video-connect[.]online
Domain
Phishing domain
High
www.go0gle[.]online
Domain
Phishing domain
High
meet.go0gle[.]online
Domain
Phishing domain
High
go0gle[.]online
Domain
Phishing domain
High
tensore[.]online
Domain
Phishing domain
High
ell-safe[.]online
Domain
Phishing domain
High
azdava[.]online
Domain
Phishing domain
High
meet.azdava[.]online
Domain
Phishing domain
High
meet.ell-safe[.]online
Domain
Phishing domain
High
viliam.azdava[.]online
Domain
Phishing domain
High
viliam.tensore[.]online
Domain
Phishing domain
High
viliam.teslator[.]online
Domain
Phishing domain
High
teslator[.]online
Domain
Phishing domain
High
viliam.kuret-live[.]online
Domain
Phishing domain
High
kuret-live[.]online
Domain
Phishing domain
High
book.kuret-live[.]online
Domain
Phishing domain
High
viliam.safe-lord[.]online
Domain
Phishing domain
High
safe-lord[.]online
Domain
Phishing domain
High
www.p-safe[.]online
Domain
Phishing domain
High
viliam.p-safe[.]online
Domain
Phishing domain
High
p-safe[.]online
Domain
Phishing domain
High
into-support[.]online
Domain
Phishing domain
High
villiam[.]online-speak[.]online
Domain
Phishing domain
High
viliam[.]online-speak[.]online
Domain
Phishing domain
High
online-speak[.]online
Domain
Phishing domain
High
viliam.into-support[.]online
Domain
Phishing domain
High
viliam.alpha-met[.]online
Domain
Phishing domain
High
alpha-met[.]online
Domain
Phishing domain
High
viliam.kuret-met[.]online
Domain
Phishing domain
High
viliam.live-board[.]online
Domain
Phishing domain
High
live-board[.]online
Domain
Phishing domain
High
www.owner-rate[.]online
Domain
Phishing domain
High
viliam.owner-rate[.]online
Domain
Phishing domain
High
owner-rate[.]online
Domain
Phishing domain
High
viliam.alpha-meet[.]online
Domain
Phishing domain
High
alpha-meet[.]online
Domain
Phishing domain
High
arcanet[.]online
Domain
Phishing domain
High
viliam.arcanet[.]online
Domain
Phishing domain
High
viliam.cppsg[.]online
Domain
Phishing domain
High
cppsg[.]online
Domain
Phishing domain
High
rohand63[.]xyz
Domain
Phishing domain
High
www.rohand63[.]xyz
Domain
Phishing domain
High
viliam.rohand63[.]xyz
Domain
Phishing domain
High
robinthing123[.]online
Domain
Phishing domain
High
viliam.robinthing123[.]online
Domain
Phishing domain
High
viliam.superlite[.]online
Domain
Phishing domain
High
superlite[.]online
Domain
Phishing domain
High
dmn-inter[.]online
Domain
Phishing domain
High
viliam.dmn-inter[.]online
Domain
Phishing domain
High
www.toolfare[.]online
Domain
Phishing domain
High
viliam.toolfare[.]online
Domain
Phishing domain
High
toolfare[.]online
Domain
Phishing domain
High
oranus.besatoo[.]online
Domain
Phishing domain
High
viliam.besatoo[.]online
Domain
Phishing domain
High
mickel.besatoo[.]online
Domain
Phishing domain
High
live.besatoo[.]online
Domain
Phishing domain
High
besatoo[.]online
Domain
Phishing domain
High

Share on

[juiz_sps buttons="facebook, twitter, linkedin, mail"]